andigandhi / bitpixieLinks
bitpixie Proof of Concept - Bitlocker Decryptor
☆120Updated 4 months ago
Alternatives and similar repositories for bitpixie
Users that are interested in bitpixie are comparing it to the libraries listed below
Sorting:
- Bitpixie exploitation PoC☆92Updated 3 months ago
- A list of public attacks on BitLocker☆406Updated 5 months ago
- DPAPILAB Next Gen, script collection☆93Updated 3 years ago
- ☆82Updated 3 years ago
- ☆164Updated 7 months ago
- Volatility plugin to retrieve the Full Volume Encryption Key in memory. The FVEK can then be used with the help of Dislocker to mount the…☆55Updated 6 years ago
- ☆301Updated last year
- ☆72Updated 11 months ago
- Decrypt the bitlocker FVEK for a bitlocker encrypted drive.☆38Updated last month
- Diana Credential Recovery Framework☆66Updated last week
- A repo for TPM sniffing greatness☆243Updated 3 weeks ago
- ☆150Updated last year
- ☆133Updated 2 years ago
- Cheat sheet to detect and remove linux kernel rootkit☆78Updated last year
- Establishes persistence on a Linux system by creating a udev rule that triggers the execution of a specified payload (binary or script)☆146Updated last year
- Scanning tool for identifying local privilege escalation issues in vulnerable MSI installers☆125Updated last year
- ☆68Updated 3 years ago
- eXtensions for Financial Services (XFS) proof of concept client to explore and issue commands directly to the devices that support the pr…☆89Updated 5 years ago
- Powershell Linter☆86Updated last month
- ☆189Updated 2 years ago
- Direct access to NTFS volumes☆291Updated 4 months ago
- PowerDecode is a PowerShell-based tool that allows to deobfuscate PowerShell scripts obfuscated across multiple layers. The tool performs…☆228Updated last year
- LOLESXi is a curated compilation of binaries/scripts available in VMware ESXi that are were used to by adversaries in their intrusions. T…☆143Updated last month
- Tools for analyzing EDR agents☆276Updated last year
- ☆122Updated 3 weeks ago
- An interactive shell to spoof some LOLBins command line☆188Updated 2 years ago
- Nuke It From Orbit - remove AV/EDR with physical access☆270Updated last year
- Win32 Shellcode CheatSheet: Your visual guide for crafting and understanding shellcode. Ideal for malware, and exploit developers☆65Updated last year
- ☆160Updated last year
- A tool to find folders excluded from AV real-time scanning using a time oracle☆234Updated last year